Which of the following are likely indicators of compromise? (Select all that apply)
Use of dormant accounts
Deleted or edited logs
An employee login from a remote location
Alerts from an intrusion detection system
Next Concept